Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014 | 154 | 2014 |
Neural machine translation inspired binary code similarity comparison beyond function pairs F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019 | 50 | 2019 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017 | 50 | 2017 |
Integrating BIMserver and OpenStudio for energy efficient building N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen Computing in Civil Engineering (2013), 516-523, 2013 | 26 | 2013 |
Repackage-proofing Android Apps L Luo, Y Fu, D Wu, S Zhu, P Liu Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016 | 25 | 2016 |
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 20* | 2017 |
Resilient decentralized android application repackaging detection using logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li Proceedings of the 2018 International Symposium on Code Generation and …, 2018 | 16 | 2018 |
Solminer: mining distinct solutions in programs L Luo, Q Zeng Proceedings of the 38th International Conference on Software Engineering …, 2016 | 13 | 2016 |
A multiversion programming inspired approach to detecting audio adversarial examples Q Zeng, J Su, C Fu, G Kayas, L Luo Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019 | 12 | 2019 |
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis K Redmond, L Luo, Q Zeng The NDSS Workshop on Binary Analysis Research (BAR), 2019 | 9 | 2019 |
Touch well before use: Intuitive and secure authentication for iot devices X Li, F Yan, F Zuo, Q Zeng, L Luo The 25th Annual International Conference on Mobile Computing and Networking …, 2019 | 7 | 2019 |
Exploiting the inherent limitation of l0 adversarial examples F Zuo, B Yang, X Li, Q Zeng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 6* | 2019 |
PFirewall: Semantics-aware customizable data flow control for home automation systems H Chi, Q Zeng, X Du, L Luo arXiv preprint arXiv:1910.07987, 2019 | 5 | 2019 |
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding Q Zeng, G Kayas, E Mohammed, L Luo, X Du, J Rhee Proceedings of the 49th Annual IEEE/IFIP International Conference on …, 2019 | 5* | 2019 |
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019 | 2 | 2019 |
A Distributed Storage Access System for Mass Data using3-tier Architecture L Luo, G Sun, W Yu Proceedings of 2011 International Conference on Computer Science and …, 2011 | 2 | 2011 |
T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices X Li, Q Zeng, L Luo, T Luo Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 1 | 2020 |
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas IEEE Transactions on Dependable and Secure Computing, 2019 | 1 | 2019 |
On the Robustness of Stochastic Stealthy Network Against Android App Repackaging R Norboev, Z Hossain, L Luo, Q Zeng | 1 | 2017 |
Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification L Luo 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | | 2020 |